[1]
M. K. A. G. P. V. K. V. C. S., “Data Leakage Detection using Fake Data for Identifying Guilty Agents”, IJRITCC, vol. 4, no. 3, pp. 536–539, Mar. 2016.